Back to Browse

Exploiting Ruby deserialization using a documented gadget chain - Lab#07

651 views
Apr 8, 2025
7:31

In this video, I demonstrate how to exploit Ruby on Rails deserialization using a documented gadget chain to achieve remote code execution (RCE). The target application uses a serialization-based session mechanism, which can be abused by crafting a malicious serialized object. Using a known exploit against Ruby on Rails deserialization, I generate a payload that deletes the morale.txt file from Carlos’s home directory, completing the lab challenge. 🔹 Lab Type: Insecure Deserialization (Ruby on Rails) 🔹 Framework: Ruby on Rails 🔹 Exploit Strategy: Use documented gadget chain to generate RCE payload → Inject into session 🔹 Target Action: Delete morale.txt 📌 Subscribe for more lab walkthroughs, real-world deserialization attacks, and Ruby exploitation content! 🧠🐍💣 #RubyOnRails #InsecureDeserialization #RCE #WebSecurity #PortSwigger #BugBounty #CyberSecurity #EthicalHacking #CTF

Download

0 formats

No download links available.

Exploiting Ruby deserialization using a documented gadget chain - Lab#07 | NatokHD